Computer viruses: An overview for records managers

Roy, Patricia Graham; Kenny, W.J
April 1991
Records Management Quarterly;Apr91, Vol. 25 Issue 2, p18
Academic Journal
Provides a framework by which records managers may clearly understand the computer virus problem and to present some effective measures for recognizing and dealing with viruses. Definitional aspects of computer virus; How computer viruses work; Impacts of computer viruses; What must be done to protect valuable computer resources from virus attack; How to prevent viruses; How to detect viruses; Correcting viruses; Conclusion.


Related Articles

  • The PC corner: Computer viruses. Kratofil, Bruce // Business Economics;Jan1990, Vol. 25 Issue 1, p52 

    Discusses computer viruses. Harmfulness of computer viruses; Ways of transmitting a virus; Preventive measures against computer virus attacks.

  • The virus from e-mail is not what you think. Dyril, Odvard Egil // Tech & Learning;Apr98, Vol. 18 Issue 8, p42 

    Presents information on computer viruses focusing on what the e-mail message virus, `Join the Crew' can do to computer hard drives. How the virus operates; What a computer virus is; Information on e-mail hoaxes; Detailed information on how to protect against such viruses.

  • Virus reports average 58 per month.  // Computing Japan;Jan1997, Vol. 4 Issue 1, p11 

    Points out the increase in the number computer virus infections reported in Japan from January to September 1996. Data from the nonprofit organization, Information Technology Promotion Agency (IPA); Sources of most infections; Top computer viruses; Contact information.

  • Costly computer Gremlins sneak back. Belsie, Laurent // Christian Science Monitor;4/2/96, Vol. 88 Issue 88, p4 

    Reports on the prevalence of viruses in the United States. Examination of computer viruses; Discussion of a survey involving 300 companies; Negative consequences of encountering a virus.

  • Ask Mr. Technology. Huber, Joe // Technology Connection;Nov96, Vol. 3 Issue 7, p47 

    Answers a question on a computer virus problem that affects the master boot record. Effectiveness of the F-PROT program for locating and cleaning viruses.

  • Fighting the battle against computer viruses.  // New Hampshire Business Review;9/29/95, Vol. 17 Issue 20, p6A 

    Features a reprint of an article that appeared in the September 1995 issue of `StepAhead,' a newsletter published by NYNEX regarding suggestions on how to fight computer viruses. Definition of a computer virus; Misconceptions; Protection of computer system; Frequency of checking system for viruses.

  • Tricky worm triggers new P2P alarms. Messmer, Ellen // Network World;5/19/2003, Vol. 20 Issue 20, p1 

    Reports on the discovery of a computer worm called Fizzer sneaking into U.S. corporate networks via the Kazaa peer-to-peer program. Concerns about the risks of file-sharing networks; Decision of many companies to ban peer-to-peer applications.

  • Virus watch. Littman, Dan; Moran, Tom // Macworld;Dec1992, Vol. 9 Issue 12, p177 

    Alerts Mac users to current viruses, Trojan horses, and worms. T4-A, T4-B, virus, damages system files and applications; ChinaTalk, Trojan horse, deletes the contents of disk drive on restart; INIT 1984, virus, destroys files and changes file and folder names and attributes to random garbage;...

  • The virus that fizzled.  // Australian Personal Computer;Oct96, Vol. 17 Issue 10, p24 

    Focuses on the media's exaggeration of the Krsna memory-resident and polymorphic computer virus, which was detected in Australia in June 1996. Impact of the virus on Internet service provider OzEmail; Antivirus company Cybec's disinfection of affected systems; Profile of a virus writer;...

  • Slammer was the fastest worm yet. Cushing, Karl; Simons, Mike // Computer Weekly;2/6/2003, p8 

    Reports on damages caused by the attack of the computer virus Slammer worm on computers in Great Britain. Estimation of number of computers damaged by the attack; Comparison of damages caused by Slammer worm and other viruses; Computer softwares affected by the attack.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics